SlideShare a Scribd company logo
RANDOM ACCESS
PROTOCOL IN
COMMUNICATION
BY: AMOGHA.A.K.
ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT
• Introduction
• Problem Statement
• History
• Need for Random access
• Functions
• What is ALOHA & CSMA?
• Flow Chart
• Simulated Graphs
• Advantages
• Limitations
• Applications
• Future Scope
• Conclusion
• References
Contents
 In random access ,each station has right to send the data.
However , if more than one station tries to send ,collision
will occur .To avoid this collision , protocols came into
existence.
 In random access method , no stations are superior &
none is assigned the control over the other .
 When a station has a data to send , it uses a procedure
defined by a protocol whether to send or not .
Introduction
When 2 users transmit the data packets at the
same time , collision occurs & these packets
are destroyed .
To avoid this , random access protocol has
been adopted .
Problem Statement
 The development of ALOHA network
commenced in 1968 at the University of
Hawaii by Norman Abramson.
 It became operational in 1971 .
 During 1980’s the frequencies were assigned
for mobile medium .
 In 1985, frequencies were made available for
WIFI facilities .
History of ALOHA
Need For Protocol
When two computers are connected via
single connection , the data collision takes
place .
Hence to avoid , a set of rules & regulations
are needed which are called the protocols.
Describes the rules that govern
the transmission of data over the
communication network.
Provides a method for orderly and
efficient exchange of data between the
sender and the receiver.
Functions of Protocol
ALOHA is for coordinating & accessing to
share communication in network channel.
It is the simplest collision resolution
protocol .
What is ALOHA ?
1.Pure Aloha:
 This is the original version of Aloha .
2.Slotted Aloha:
 This is the modified version of pure
Aloha.
Types of Aloha
What is Pure Aloha ?
 Whenever a station has a data , it transmits.
 When 2 or more stations transmit data at same time ,
there is a collision .Hence, the sender waits a random
amount of time & then re-transmit the data again .
 The waiting time is random , otherwise the same packet
will collide again .
What is Slotted Aloha ?
 Slotted ALOHA was invented to improve the efficiency of
pure ALOHA as collisions in Pure ALOHA are very high .
 In slotted ALOHA , the time is divided into discrete intervals
called slots .
 Station can send a frame only at the beginning of the slot &
only one frame is sent in each slot .
Principle of Aloha without collision
Principle of Aloha with collision
FRAMES IN PURE ALOHA
NETWORK
VULNERABLE TIME FOR PURE
ALOHA PROTOCOL
FLOW CHART FOR PURE ALOHA
FRAMES IN SLOTTED ALOHA
NETWORK
VULNERABLE TIME FOR
SLOTTED ALOHA PROTOCOL
FLOW CHART FOR SLOTTED
ALOHA
Simulated Performance of Pure
ALOHA
Simulated Performance of Slotted
ALOHA
Efficiency of Slotted v/s Pure Aloha
Comparison between Pure &
Slotted Aloha
The chances of collisions are more in
Pure ALOHA as compared to Slotted
ALOHA .
Slotted ALOHA is more efficient as
compared to Pure ALOHA .
Advantages of ALOHA
 Packet contention technique
 Single active node can continuously transmit at full
rate .
 Highly decentralized
 Simple protocol
Disadvantages of ALOHA
 Collisions
 Idle slots
 Clock synchronization
What is CSMA ?
 CSMA protocol was developed to overcome the
problem found in ALOHA i.e. to minimize the chances
of collision to improve the performance .
 CSMA is a network access method used on shared
network topologies .
 It is based on the principle of ‘carrier sense ’ .
Space / Time Model of Collision in
CSMA
Vulnerable Time in CSMA
 If the channel is idle, station transmits the frame, if busy
senses the channel after random time.
 This protocol reduces the chance of collision but longer
delays.
 It is a non - aggressive transmission algorithm.
Non- Persistence
 This protocol is called 1 – Persistence because the station
transmits with probability of 1. When it finds the
channel idle without any collision , station continuously
sense the channel until it becomes free.
 It is an aggressive transmission algorithm.
1 - Persistence
Flow Chart of Non-Persistent
Flow Chart of 1-Persistence
Channel Busy ?
Simulation of Non-Persistence
Simulation Performance of 1-
Persistence
Out of these 2-types of CSMA it is found
that Non-persistence CSMA performs the
best.
Summary of CSMA
 Low-data-rate tactical satellite communications networks by
military forces.
 In subscriber-based satellite communications networks.
 Mobile telephony call setup
 Set-top box communications
 In the contactless RFID technologies.
Applications
 Research is to be made to avoid any security
breach & improvement in packet delivery
efficiency .
Future Scope
Conclusions
Computer networks & protocols have
changed the humans working &
communication.
The digital network is empowering us for
future.
References
 www.My reading room/aloha protocol.com
 Protocol – oriented programming , Jon Hoffman
 www.searchnetworking.techtarget.com
 ALOHA Random Access that Operates as a
 Rateless Code domir Stefanovi´c, Member, IEEE, Petar Popovski,
Senior Member, IEEE 7-Aug,2013
 Throughput Analysis of Wireless Relay Slotted ALOHA Systems
with Network Coding Daisuke Umehara, Tomoya Hirano, Satoshi
Denno, and Masahiro Morikura Graduate School of Informatics,
Kyoto University Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501,
Japan-IEEE -2016
 http://users.cs.cf.ac.uk/Dave.Marshall/Internet/node41.html
THANK YOU ALL & HAVE
A NICE DAY

More Related Content

What's hot

Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
Pruthviraj Konu
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Congestion control
Congestion controlCongestion control
Congestion control
Nithin Raj
 
Aloha
AlohaAloha
Aloha
mangal das
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
kazim Hussain
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Unit 4
Unit 4Unit 4
Error control
Error controlError control
Error control
Bhupendra sahu
 

What's hot (20)

Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Mac layer
Mac  layerMac  layer
Mac layer
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Aloha
AlohaAloha
Aloha
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Unit 4
Unit 4Unit 4
Unit 4
 
Error control
Error controlError control
Error control
 

Similar to RANDOM ACCESS PROTOCOL IN COMMUNICATION

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of aloha
AkshathaM29
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
novrain1
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
kidoson243
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
NANDINI SHARMA
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
vadasairaju143
 
aloha
alohaaloha
aloha
DeepikaT13
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
Joshuaeeda1
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
TapanManik
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
MAC
MACMAC

Similar to RANDOM ACCESS PROTOCOL IN COMMUNICATION (20)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of aloha
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
aloha
alohaaloha
aloha
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
MAC
MACMAC
MAC
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

RANDOM ACCESS PROTOCOL IN COMMUNICATION

  • 1. RANDOM ACCESS PROTOCOL IN COMMUNICATION BY: AMOGHA.A.K. ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT
  • 2. • Introduction • Problem Statement • History • Need for Random access • Functions • What is ALOHA & CSMA? • Flow Chart • Simulated Graphs • Advantages • Limitations • Applications • Future Scope • Conclusion • References Contents
  • 3.  In random access ,each station has right to send the data. However , if more than one station tries to send ,collision will occur .To avoid this collision , protocols came into existence.  In random access method , no stations are superior & none is assigned the control over the other .  When a station has a data to send , it uses a procedure defined by a protocol whether to send or not . Introduction
  • 4. When 2 users transmit the data packets at the same time , collision occurs & these packets are destroyed . To avoid this , random access protocol has been adopted . Problem Statement
  • 5.  The development of ALOHA network commenced in 1968 at the University of Hawaii by Norman Abramson.  It became operational in 1971 .  During 1980’s the frequencies were assigned for mobile medium .  In 1985, frequencies were made available for WIFI facilities . History of ALOHA
  • 6. Need For Protocol When two computers are connected via single connection , the data collision takes place . Hence to avoid , a set of rules & regulations are needed which are called the protocols.
  • 7. Describes the rules that govern the transmission of data over the communication network. Provides a method for orderly and efficient exchange of data between the sender and the receiver. Functions of Protocol
  • 8. ALOHA is for coordinating & accessing to share communication in network channel. It is the simplest collision resolution protocol . What is ALOHA ?
  • 9. 1.Pure Aloha:  This is the original version of Aloha . 2.Slotted Aloha:  This is the modified version of pure Aloha. Types of Aloha
  • 10. What is Pure Aloha ?  Whenever a station has a data , it transmits.  When 2 or more stations transmit data at same time , there is a collision .Hence, the sender waits a random amount of time & then re-transmit the data again .  The waiting time is random , otherwise the same packet will collide again .
  • 11. What is Slotted Aloha ?  Slotted ALOHA was invented to improve the efficiency of pure ALOHA as collisions in Pure ALOHA are very high .  In slotted ALOHA , the time is divided into discrete intervals called slots .  Station can send a frame only at the beginning of the slot & only one frame is sent in each slot .
  • 12. Principle of Aloha without collision
  • 13. Principle of Aloha with collision
  • 14. FRAMES IN PURE ALOHA NETWORK
  • 15. VULNERABLE TIME FOR PURE ALOHA PROTOCOL
  • 16. FLOW CHART FOR PURE ALOHA
  • 17. FRAMES IN SLOTTED ALOHA NETWORK
  • 18. VULNERABLE TIME FOR SLOTTED ALOHA PROTOCOL
  • 19. FLOW CHART FOR SLOTTED ALOHA
  • 21. Simulated Performance of Slotted ALOHA
  • 22. Efficiency of Slotted v/s Pure Aloha
  • 23. Comparison between Pure & Slotted Aloha The chances of collisions are more in Pure ALOHA as compared to Slotted ALOHA . Slotted ALOHA is more efficient as compared to Pure ALOHA .
  • 24. Advantages of ALOHA  Packet contention technique  Single active node can continuously transmit at full rate .  Highly decentralized  Simple protocol
  • 25. Disadvantages of ALOHA  Collisions  Idle slots  Clock synchronization
  • 26. What is CSMA ?  CSMA protocol was developed to overcome the problem found in ALOHA i.e. to minimize the chances of collision to improve the performance .  CSMA is a network access method used on shared network topologies .  It is based on the principle of ‘carrier sense ’ .
  • 27. Space / Time Model of Collision in CSMA
  • 29.  If the channel is idle, station transmits the frame, if busy senses the channel after random time.  This protocol reduces the chance of collision but longer delays.  It is a non - aggressive transmission algorithm. Non- Persistence
  • 30.  This protocol is called 1 – Persistence because the station transmits with probability of 1. When it finds the channel idle without any collision , station continuously sense the channel until it becomes free.  It is an aggressive transmission algorithm. 1 - Persistence
  • 31. Flow Chart of Non-Persistent
  • 32. Flow Chart of 1-Persistence Channel Busy ?
  • 34. Simulation Performance of 1- Persistence
  • 35. Out of these 2-types of CSMA it is found that Non-persistence CSMA performs the best. Summary of CSMA
  • 36.  Low-data-rate tactical satellite communications networks by military forces.  In subscriber-based satellite communications networks.  Mobile telephony call setup  Set-top box communications  In the contactless RFID technologies. Applications
  • 37.  Research is to be made to avoid any security breach & improvement in packet delivery efficiency . Future Scope
  • 38. Conclusions Computer networks & protocols have changed the humans working & communication. The digital network is empowering us for future.
  • 39. References  www.My reading room/aloha protocol.com  Protocol – oriented programming , Jon Hoffman  www.searchnetworking.techtarget.com  ALOHA Random Access that Operates as a  Rateless Code domir Stefanovi´c, Member, IEEE, Petar Popovski, Senior Member, IEEE 7-Aug,2013  Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding Daisuke Umehara, Tomoya Hirano, Satoshi Denno, and Masahiro Morikura Graduate School of Informatics, Kyoto University Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501, Japan-IEEE -2016  http://users.cs.cf.ac.uk/Dave.Marshall/Internet/node41.html
  • 40. THANK YOU ALL & HAVE A NICE DAY